SSSFS: A Stackable Survivable Storage File System

In this insecure, non-reliable and automated world there is a need of security and availability technique for data at the file system level. Key safeguarding and key encryption is not reliable techniques. Hence, proposed a Stackable Survival Storage File System (SSSFS) which is useful in securing and maintain availability of archive data for a longer period of time. SSSFS distribute the data automatically into number of shares and saves on distributed storage nodes irrespective of their file system over the network. These shares do not reveal any information about the secret data until and unless certain numbers of shares are met. The distribution and reformation should be done by using the secret sharing scheme over the different storage nodes by using username and password technique to access them. SSSFS resides below the Virtual File System and above the low level file system at kernel level. Distribution resident at kernel level, hence, it benefits from increased performance due to the minimum amount of context switches between user and kernel level and as of running in privileged mode. A kernel based feature can tender better security as compared to user level for the reason that information that is kernel resident is bit tough to get and the kernel has improved access to private resources not available somewhere else and have less involvement of user.

[1]  Erez Zadok A Stackable File System Interface For Linux , 1999 .

[2]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[3]  Erez Zadok,et al.  FIST: a language for stackable file systems , 2000, OPSR.

[4]  Mutsuo Sano,et al.  Realtime Network Backup to Existing Servers Based on Stackable Filesystem , 2009, 2009 International Conference on Complex, Intelligent and Software Intensive Systems.

[5]  Yun Yang,et al.  A Novel Cost-Effective Dynamic Data Replication Strategy for Reliability in Cloud Data Centres , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[6]  Adi Shamir,et al.  How to share a secret , 1979, CACM.